CVE-2025-9231
OpenSSL vulnerability analysis and mitigation

Overview

CVE-2025-9231 is a timing side-channel vulnerability discovered in the SM2 algorithm implementation on 64-bit ARM platforms. The vulnerability was reported on August 18, 2025, by Stanislav Fort from Aisle Research. It affects OpenSSL versions 3.2 through 3.5, while versions 3.1, 3.0, 1.1.1, and 1.0.2 are not vulnerable (OpenSSL Advisory). The vulnerability has been assigned a CVSS score of 6.5 (Medium) (Ubuntu CVE).

Technical details

The vulnerability exists in the SM2 algorithm implementation specifically on 64-bit ARM platforms. Timing measurements revealed a timing signal that could potentially allow remote recovery of the private key through timing side-channel analysis. While OpenSSL does not directly support certificates with SM2 keys in TLS, the vulnerability becomes relevant when such support is added via a custom provider (OpenSSL Advisory). The issue has been fixed by implementing constant-time modular inversion, as evidenced by the code changes in the OpenSSL repository (OpenSSL Commit).

Impact

The vulnerability could allow an attacker to recover the private key through timing measurements. While remote key recovery over a network was not demonstrated by the reporter, the presence of a timing signal suggests such an attack might be possible. The impact is particularly relevant in contexts where custom providers are used to add support for SM2 certificates (OpenSSL Advisory).

Mitigation and workarounds

Users of affected versions should upgrade to the following patched versions: OpenSSL 3.5.4, OpenSSL 3.4.3, OpenSSL 3.3.5, or OpenSSL 3.2.6, depending on their current version. The FIPS modules in versions 3.5, 3.4, 3.3, 3.2, 3.1, and 3.0 are not affected by this issue as SM2 is not an approved algorithm (OpenSSL Advisory).

Additional resources


SourceThis report was generated using AI

Related OpenSSL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-53159CRITICAL9.1
  • RustRust
  • openssl
NoYesJul 28, 2025
CVE-2025-9230HIGH7.5
  • OpenSSLOpenSSL
  • cpe:2.3:a:openssl:openssl
NoYesSep 30, 2025
CVE-2025-9231MEDIUM6.5
  • OpenSSLOpenSSL
  • openssl
NoYesSep 30, 2025
CVE-2025-9232MEDIUM5.9
  • OpenSSLOpenSSL
  • openssl
NoYesSep 30, 2025
CVE-2025-27587MEDIUM5.3
  • OpenSSLOpenSSL
  • libopenssl3
NoYesJun 16, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management